Documente Academic
Documente Profesional
Documente Cultură
modul 1
1 What is the default number of pings issued by a DHCP server to a pool
address before sending the DHCPOFFER to a client?
one
* two
three
four
five
2 Refer to the graphic. Which command would allow the router to forward DHCP
broadcasts from Host A to the DHCP server?
* ip helper-address
dhcp helper-address
dhcp relay-agent
dhcp-relay
3 Which of the following traffic types are supported by Cisco IOS NAT? (Choose
two.)
Routing table updates
* ICMP
* FTP
BOOTP
SNMP
4 Users are complaining that they cannot attach to network resources. A
technician has confirmed that clients are not properly receiving IP configuration
information through the DHCP process. The network administrator wants to
watch the DHCP process while the technician tries to release and renew
addresses on the clients. Which command would the network administrator use
to monitor the process of address allocation?
show ip dhcp server statistics
show ip dhcp binding
* debug ip dhcp server events
debug ip dhcp binding
5 Given the accompanying graphic, which command would establish a group of
32 IP addresses that could be used to hide inside addresses from the Internet?
ip nat pool Raleigh 10.0.0.32 10.0.0.63 netmask 255.255.255.224
ip nat pool Raleigh 10.0.0.32 10.0.0.63 netmask 255.255.255.240
* ip nat pool Raleigh 171.11.10.32 171.11.10.63 netmask 255.255.255.224
ip nat pool Raleigh 171.11.10.32 171.11.10.63 netmask 255.255.255.240
6 Given the accompanying diagram, which commands are necessary to
The DHCP server uses the DHCPDECLINE message to refuse a DHCP client's
request for IP configuration information.
* If the DHCP client detects that the address supplied by the DHCP server is
in use on the network, it uses the DHCPDECLINE to refuse the offer.
12 Given the accompanying graphic, which statement would be applied to the S0
interface when configuring NAT on the Tampa router?
ip nat inside
* ip nat outside
ip pat inside
ip pat outside
13 What is true regarding the differences between NAT and PAT?
PAT uses the word "overload" at the end of the access-list statement to share a
single registered address.
Static NAT allows an unregistered address to map to multiple registered
addresses.
Dynamic NAT allows hosts to receive the same global address each time
external access is required.
* PAT uses unique source port numbers to distinguish between
translations.
14 What is the default lease time for addresses assigned to clients through Easy
IP?
* twenty-four hours
forty-eight hours
one week
two weeks
15 Which of the following are broadcasts sent by a client to a DHCP server?
(Choose two.)
* DHCPDISCOVER
DHCPRELEASE
DHCPACK
* DHCPREQUEST
DHCPOFFER
16 Given the accompanying graphic, which addresses could be assigned to
traffic leaving S0 as a result of the statement ip nat pool Tampa 179.9.8.96
179.9.8.111 netmask 255.255.255.240? (Choose two.)
10.0.0.125
179.9.8.95
* 179.9.8.98
* 179.9.8.101
179.9.8.112
Cisco CCNA 4
Modul 2
1 Which statement is true regarding WAN technologies?
Most WANS use only one technology throughout the infrastructure such as ISDN,
Frame Relay or ATM.
Data transfer speeds on the WAN are typically faster than the speeds on a LAN.
*WANs operate at the lower three layers of the OSI model.
WANs are unable to support the transfer of voice or video traffic.
2 Which of the following are disadvantages of circuit-switched networks?
(Choose two.)
Data is subject to unpredictable delays while it waits for other subscribers to
transmit data.
* The connection capacity is used inefficiently due to irregular traffic
bursts.
Data delivery is less reliable because only connectionless delivery methods are
used.
* Circuit-switched networks are more expensive for data traffic.
Circuit-switched networks are less expensive for 24/7 data traffic.
3 A company requires a WAN connection that will carry 64 kbps and allow fast
call setup time. The connection does not need to carry video. What is the best
choice for this company?
ATM
ISDN BRI
X.25
* analog dialup
4 Which of the following is commonly used as Data Terminal Equipment?
ISDN
* modem
router
CSU/DSU
5 Why is it important to identify the type of traffic that will be carried on the WAN
links before choosing a WAN technology?
to determine the routing protocol to be used on the WAN link
to determine the WAN topology
* to determine the requirements for latency and jitter
to determine the type of signaling protocol to be used on the WAN link
6 On which of the following are most Layer 2 WAN encapsulations based?
IP
PPP
* HDLC
SLIP
HSSI
CSU
7 Which term describes the cabling that connects the customer site to the
nearest exchange of the WAN service provider?
CPE
CO
* local loop
DCE
DTE
8 A European company needs a low cost, dialup WAN connection to validate
transactions for point-of-sale card readers. Which connection type is commonly
used for this situation?
ATM
* X.25
Frame Relay
Leased lines
9 Which of the following describes a packet-switched network using connectionoriented data transfer? (Choose two.)
* Each packet carries an identifier.
Each packet carries full addressing information.
Each switch in the route must evaluate the addressing information to determine
where to send the packet.
* Each switch determines where to send the packet by examining tables in
memory.
The addressing information is used to set switches along the route of data
transfer to create a continuous copper circuit.
10 A large company already has a T1 leased line but this connection is
inadequate at peak business hours. Furthermore, they would like a backup WAN
connection in case their leased line temporarily fails. What type of WAN
connection is commonly used in this situation?
X.25
DSL
* ISDN
cable modem
56 kbps
11 Depending on the company size and geographical layout, there might be
many end points on the company WAN. Why is it important to identify all the end
points of the WAN before choosing a WAN design?
to determine the routing protocol to be used on the WAN link
* to determine the WAN topology
* analog dialup
T1 Leased Line
17 Which of the statements regarding DSL are correct? (Choose three.)
DSL provides a consistent bandwidth of 2.154 Mbps.
DSL connections provide a fast dialup to establish a WAN connection.
* DSL connects the local loop to a digital subscriber line access
multiplexer.
* DSL bandwidth varies and can exceed the bandwidth of a T1/E1 leased
line.
* For DSL to function properly, the local loop must be less than 5.5
kilometers (3.5 miles).
DSL is a popular choice for enterprises that need to connect home users to the
local network due to strong security.
Cisco CCNA 4
Modul 3
1 Which of the following describe functions of the Point-to-Point protocol with
regards to the OSI model? (Choose three.)
PPP uses Layer 3 of the OSI model to establish and maintain a session between
devices.
PPP operates at all layers of the OSI model.
*PPP uses the data link layer to configure such options as error detection
and compression.
*PPP provides a mechanism to multiplex several network layer protocols.
PPP uses Network Control Protocols (NCP) to test and maintain connectivity
between devices.
*PPP can be configured on both synchronous and asynchronous serial
interfaces.
2 What can be concluded from the output shown in the graphic? (Choose three.)
A two-way handshake is occuring.
*The LCPs were already negotiated.
*The router can begin NCP negotiations.
The debug ppp negotiation command was executed.
*The debug ppp authentication command was executed.
3 Which command specifies a link quality over a PPP link?
ppp link 50
ppp link quality 60
ppp percentage 80
*ppp quality 90
4 Refer to the output of the show interface Serial0/0 command in the graphic.
How many NCPs have been established?
1
*2
3
4
5 Which authentication protocol can be spoofed to allow playback attacks?
MD5
CHAP
*PAP
NCP
6 Which of the following is an advantage of using time-division multiplexing
(TDM) for transmitting data? (Choose two.)
It allows a single source to transmit over multiple data channels.
*Multiple sources can transmit over a single channel.
*Original data streams must be reconstructed at the destination.
TDM relies on Layer 3 protocols to operate.
7 Several tasks must occur before a link between two routers can pass data
using PPP. Which of the following are required to establish and maintain a PPP
session between two routers?
configure each host with a PPP address
configure authentication between the two routers
* send LCP and NCP frames to negotiate configuration parameters
send hostname and password information between the two routers
8 Which of the following is a reason for using such protocols as PAP and CHAP?
to establish a PPP session
to provide error checking on a WAN link
* to restrict access to networks connected by serial and ISDN links
to provide a backup hostname and privilege mode password on the router
9 PPP uses several protocols for communication. Which of the following are
options that the LCP protocol in the PPP architecture can provide? (Choose two.)
* testing the quality of the link
routing packets between devices
assigning individual station addresses
configuring network layer protocols
* negotiating authentication options
10 How is the MD5 function valuable in authentication? (Choose two.)
* uses a one-way hash function
authentication occurs more rapidly
* challenges are unique
17 A network administrator in Europe has been asked to provide the network with
an ISDN WAN link. The router available to provide the WAN connection is a nonmodular Cisco router with an S/T interface. What further equipment will be
provided by the ISP for the ISDN connection?
Nothing. The router is already suitable.
BRI WAN interface card to install in the router
* an external NT1 to terminate the local loop
a TA/NT1 device to install on the router
18 Which command is used within an existing ISDN network to display current
call information, including the called number?
show isdn status
* show isdn active
show interfaces bri0/0
show ip interfaces
* preemptive multitasking
open source operating system code
* symmetric multiprocessing
* Appletalk-to-Windows network connectivity
17 Which command would enable logging on all supported destinations?
Router(config)# logging 131.152.0.0
Router(config)# logging routerA
* Router(config)# logging on
Router(config)# logging enable
* network servers
large mainframe systems
12 How does SNMPv3 address the security shortcomings of SNMPv1 and
SNMPv2c?
improved SMI features
support for centralized and distributed management
* secure access to MIBs
control of heterogeneous networks
13 Which statements describe the Windows 2000 operating system family?
(Choose three.)
* .NET Server was designed to run enterprise level web and FTP services.
Active Directory services run on both Windows 2000 Professional and Windows
2000 Server.
* The entire family of Windows 2000 operating systems can operate as a
file, print, FTP or web server.
Both Windows 2000 Professional and Server can support up to 256 simultaneous
dialup sessions.
* .NET server was designed to compete with Linux and Unix.
14 An SNMPv1 agent would issue a GetResponse message to reply to which
NMS requests? (Choose three.)
* GetRequest
GetBulkRequest
* GetNextRequest
* SetRequest
GetNextbulkRequest
15 Which of the following describes the community strings used for SNMPv1 and
SNMPv2c? (Choose two.)
* The community strings are sent using UDP.
The read only string on most devices is set to private.
The read/write string on most devices is set to public.
Only the NMA needs to be configured with the community strings.
* The community strings are sent across the network in cleartext.
16 Which features are supported by the Mac OS X system that make it a
competitive choice for operating systems? (Choose four.)
* protected memory
sixty-two bit addressing
* preemptive multitasking
open source operating system code
* symmetric multiprocessing
* Appletalk-to-Windows network connectivity
16. An ISDN circuit from a branch office is remaining connected to the regional
office. A network administrator determines a user has initiated a continuous ping
from a desktop computer to the regional office. Which configuration change
would allow the ISDN circuit to disconnect during any attempts to ping, while
otherwise functioning properly?
change the dialer list to exclude ICMP as interesting
17. - call is made (1 / 6)
3,2,1,4
18. Which protocol should be chosen to support WAN connectivity in a multivendor system and provide strong security through authentication?
PPP with CHAP
19. Which of the following are valid steps for a basic ISDN BRI configuration?
set the SPIDs if required by the ISDN switch